1. Cryptographic Hash Functions from Expander Graphs
2. Kinoshita H. An image digital signature system with ZKIP for the graph isomorphism. Proceedings of the IEEE International Conference on Image Processing; Lausanne, Switzerland: IEEE: 1996. p. 247–250.
3. Maricq A. Applications of expander graphs in cryptography. Available from: https://www.whitman.edu/Documents/Academics/Mathematics/2014/maricqaj.pdf.
4. Petit C. On graph-based cryptographic hash functions, Thèse soutenue en vue de l'obtention du grade de Docteur en Sciences Appliquées. Louvain-la-Neuve, Belgique: Université Catholique de Louvain; May 2009.